Skip to main content
Top
Published in: Wireless Personal Communications 3/2020

19-05-2020

A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications

Authors: Guangsong Li, Yongbin Zeng, Hui Guang, Gang Yu

Published in: Wireless Personal Communications | Issue 3/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

A fast handover authentication protocol takes an important role for delay-sensitive applications in wireless networks. Mobile users may be granted different priorities depending on communication fees they paid. In this paper, we present a priority-aware anonymous handover authentication protocol using attribute-based cryptography. The proposed protocol realizes mutual authentication, user anonymity, session key establishment and user revocation etc. Particularly it obtains a charming property, namely, user priority. Compared with some existing schemes, it is more efficient while satisfying security.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Mishra, A., Shin, M., & Arbaugh, W. (2003). An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM. Mishra, A., Shin, M., & Arbaugh, W. (2003). An empirical analysis of the IEEE 802.11 MAC layer handoff process. ACM.
2.
go back to reference Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. Communications Magazine IEEE, 53(4), 28–35.CrossRef Duan, X., & Wang, X. (2015). Authentication handover and privacy protection in 5G hetnets using software-defined networking. Communications Magazine IEEE, 53(4), 28–35.CrossRef
3.
go back to reference Fu, A., Zhang, G., Yu, Y., & Zhu, Z. (2014). A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks. Ksii Transactions on Internet & Information Systems, 8(9), 3250–3265. Fu, A., Zhang, G., Yu, Y., & Zhu, Z. (2014). A privacy preserving vertical handover authentication scheme for WiMAX-WiFi networks. Ksii Transactions on Internet & Information Systems, 8(9), 3250–3265.
4.
go back to reference Kumar, A., & Om, H. (2016). A secure seamless handover authentication technique for wireless LAN. In International conference on information technology, 2016 (pp. 43–47). Kumar, A., & Om, H. (2016). A secure seamless handover authentication technique for wireless LAN. In International conference on information technology, 2016 (pp. 43–47).
5.
go back to reference Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379–11394.CrossRef Wang, W., & Hu, L. (2014). A secure and efficient handover authentication protocol for wireless networks. Sensors, 14(7), 11379–11394.CrossRef
6.
go back to reference He, D., Khan, M. K., & Kumar, N. (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1/2), 67–74.CrossRef He, D., Khan, M. K., & Kumar, N. (2015). A new handover authentication protocol based on bilinear pairing functions for wireless networks. International Journal of Ad Hoc and Ubiquitous Computing, 18(1/2), 67–74.CrossRef
7.
go back to reference He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRef He, D., Bu, J., Chan, S., Chen, C., & Yin, M. (2011). Privacy-preserving universal authentication protocol for wireless communications. IEEE Transactions on Wireless Communications, 10(2), 431–436.CrossRef
8.
go back to reference Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal of Communications & Networks, 17(5), 453–462.CrossRef Shen, J., Tan, H., Moh, S., Chung, I., Liu, Q., & Sun, X. (2015). Enhanced secure sensor association and key management in wireless body area networks. Journal of Communications & Networks, 17(5), 453–462.CrossRef
9.
go back to reference Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef Wang, D., Wang, N., Wang, P., & Qing, S. (2015). Preserving privacy for free: Efficient and provably secure two-factor authentication scheme with user anonymity. Information Sciences, 321, 162–178.CrossRef
10.
go back to reference He, D., Wang, D., Xie, Q., & Chen, K. (2017). Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Science China Information Sciences, 60(5), 052104.CrossRef He, D., Wang, D., Xie, Q., & Chen, K. (2017). Anonymous handover authentication protocol for mobile wireless networks with conditional privacy preservation. Science China Information Sciences, 60(5), 052104.CrossRef
11.
go back to reference He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef He, D., Ma, M., Zhang, Y., Chen, C., & Bu, J. (2011). A strong user authentication scheme with smart cards for wireless communications. Computer Communications, 34(3), 367–374.CrossRef
12.
go back to reference Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461–3472.CrossRef Yang, G., Wong, D. S., & Deng, X. (2007). Anonymous and authenticated key exchange for roaming networks. IEEE Transactions on Wireless Communications, 6(9), 3461–3472.CrossRef
13.
go back to reference He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef He, D., Chan, S., Chen, C., Bu, J., & Fan, R. (2011). Design and validation of an efficient authentication scheme with anonymity for roaming service in global mobility networks. Wireless Personal Communications, 61(2), 465–476.CrossRef
14.
go back to reference Zhang, M., & Fang, Y. (2005). Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications, 4(2), 734–742.CrossRef Zhang, M., & Fang, Y. (2005). Security analysis and enhancements of 3GPP authentication and key agreement protocol. IEEE Transactions on Wireless Communications, 4(2), 734–742.CrossRef
15.
go back to reference Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef Lee, C. C., Hwang, M. S., & Liao, I. E. (2006). Security enhancement on a new authentication scheme with anonymity for wireless environments. IEEE Transactions on Industrial Electronics, 53(5), 1683–1687.CrossRef
16.
go back to reference He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Secure and efficient handover authentication based on bilinear pairing functions. IEEE Transactions on Wireless Communications, 11(1), 48–53.CrossRef
17.
go back to reference Li, G., Jiang, Q., Wei, F., & Ma, C. (2014). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581–589.CrossRef Li, G., Jiang, Q., Wei, F., & Ma, C. (2014). A new privacy-aware handover authentication scheme for wireless networks. Wireless Personal Communications, 80(2), 581–589.CrossRef
18.
go back to reference Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011) A privacy preserving handover authentication scheme for EAP-based wireless networks. In Global telecommunications conference, 2011 (pp. 1–6). Jing, Q., Zhang, Y., Fu, A., & Liu, X. (2011) A privacy preserving handover authentication scheme for EAP-based wireless networks. In Global telecommunications conference, 2011 (pp. 1–6).
19.
go back to reference He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef He, D., Chen, C., Chan, S., & Bu, J. (2012). Analysis and improvement of a secure and efficient handover authentication for wireless networks. IEEE Communications Letters, 16(8), 1270–1273.CrossRef
20.
go back to reference Yeo, S. L., Yap, W. S., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef Yeo, S. L., Yap, W. S., Liu, J. K., & Henricksen, M. (2013). Comments on “Analysis and Improvement of a Secure and Efficient Handover Authentication Based on Bilinear Pairing Functions”. IEEE Communications Letters, 17(8), 1521–1523.CrossRef
21.
go back to reference Jo, H. J., Paik, J. H., & Dong, H. L. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef Jo, H. J., Paik, J. H., & Dong, H. L. (2014). Efficient privacy-preserving authentication in wireless mobile networks. IEEE Transactions on Mobile Computing, 13(7), 1469–1481.CrossRef
22.
go back to reference Sultan, N. H., & Sarma, N. (2014). PAPAR: Pairing based authentication protocol with anonymous roaming for wireless mesh networks. In International conference on information technology, 2014 (pp. 155–160). Sultan, N. H., & Sarma, N. (2014). PAPAR: Pairing based authentication protocol with anonymous roaming for wireless mesh networks. In International conference on information technology, 2014 (pp. 155–160).
23.
go back to reference Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools & Applications, 2016, 1–15. Kwon, H., Kim, D., Hahn, C., & Hur, J. (2016). Secure authentication using ciphertext policy attribute-based encryption in mobile multi-hop networks. Multimedia Tools & Applications, 2016, 1–15.
24.
go back to reference Alpár, G., Batina, L., Batten, L., Moonsamy, V., Krasnova, A., et al. (2016) New directions in IoT privacy using attribute-based authentication. In ACM international conference on computing frontiers, 2016 (pp. 461–466). Alpár, G., Batina, L., Batten, L., Moonsamy, V., Krasnova, A., et al. (2016) New directions in IoT privacy using attribute-based authentication. In ACM international conference on computing frontiers, 2016 (pp. 461–466).
25.
go back to reference Boneh, D., Boyen, X., & Goh, E.-J. (2005). Hierarchical identity based encryption with constant size ciphertext. In Annual international conference on the theory and applications of cryptographic techniques, 2005 (pp. 440–456). Springer. Boneh, D., Boyen, X., & Goh, E.-J. (2005). Hierarchical identity based encryption with constant size ciphertext. In Annual international conference on the theory and applications of cryptographic techniques, 2005 (pp. 440–456). Springer.
26.
go back to reference Sahai, A., & Waters, B. (2005) Fuzzy identity-based encryption. In International conference on theory and applications of cryptographic techniques, 2005 (pp. 457–473). Sahai, A., & Waters, B. (2005) Fuzzy identity-based encryption. In International conference on theory and applications of cryptographic techniques, 2005 (pp. 457–473).
27.
go back to reference Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006) Attribute-based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security, 2006 (pp. 89–98). Goyal, V., Pandey, O., Sahai, A., & Waters, B. (2006) Attribute-based encryption for fine-grained access control of encrypted data. In ACM conference on computer and communications security, 2006 (pp. 89–98).
28.
go back to reference Chen, C., Zhang, Z., & Feng, D. (2011). Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. Berlin: Springer Berlin Heidelberg.CrossRef Chen, C., Zhang, Z., & Feng, D. (2011). Efficient ciphertext policy attribute-based encryption with constant-size ciphertext and constant computation-cost. Berlin: Springer Berlin Heidelberg.CrossRef
29.
go back to reference Ansi, X. (1999). Public Key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA). Ansi, X. (1999). Public Key cryptography for the financial services industry: The elliptic curve digital signature algorithm (ECDSA).
Metadata
Title
A Priority-Aware Anonymous Handover Authentication Protocol for Wireless Communications
Authors
Guangsong Li
Yongbin Zeng
Hui Guang
Gang Yu
Publication date
19-05-2020
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 3/2020
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-020-07492-y

Other articles of this Issue 3/2020

Wireless Personal Communications 3/2020 Go to the issue